(#z36cowq) @slashdot@feeds.twtxt.net isn’t that like asking those same 26 million people to breathe out less carbon dioxide? 🤔😆 we do a fairly similar thing here in Brisbane Australia where when I damage dry out we go on water restrictions and your sepically not allowed to do things like water your garden or what you are on. I suppose Texas could and act a similar requirement and restriction and restrict the use of air conditioners? 🤔


#zs5s6lq

(#vg6grrq) @eaplmx@twtxt.net Yeah this is true I guess. Twitter™ could show cards in your Timeline that might be related to the content being discussed in that “thread”. They could easily do that without collecting behaviour, personal information (besides reading public Tweets, which are public anyway). Then they could get rid of the shitty society mutating algorithm 😂


#7zeqjga

GPT-3 Resources - HedgeDoc

Trying to find interesting things related to GPT-3, tools, apps, etc. I haven’t found much though. There’s a lot of “hype” on Twitter™ but “no show”. Anyone come across anything interesting I should add to this list? I mean c’mon, if you’re gonna show off something, at least link to a working version, show the code, something! 🤦‍♂️


#zzs23kq

(#vg6grrq) Until Twitter™ gets rid of “targettered advertising”, you will always be manipulated by the “algorithm”. Take DuckDuckGo’s business model. They collect little to nothing about you, don’t target ads at you, they just generate revenue from serving ads based on keyword searches.


#qalqnnq

(#obnz45a) You should be able to basically perform the following steps:

  1. Download the latest v0.0.14 binary from the Releases page
  2. Replace the binary installed on the Vultr VM which I think is located in /usr/local/bin/
  3. Restart the yarnd service, which think is systemctl restart yarnd

#vqcszga

(#ijjwp4a) It’s just something I’ve been doing for quite a while now to bring together anyone from the Yarn.social / Twtxt community where we just have a good ‘ol fashioned Yarn about whatever and often also talk about upcoming features, interesting things that we’ve seen or have happened (like new spam bots that have joined my pod!) and how we can continue to improve the experience of the ecosystem at large as well as that of yarnd (what every Yarn.social pod runs)


#s4es2aq

(#jo6jxja) @slashdot@feeds.twtxt.net Another interesting summary by GPT-3:

The text describes a situation where a security consultant, Lance Vick, recently acquired the expired domain used by the maintainer of a widely used NPM package. He did this to remind the JavaScript community that the NPM Registry still hasn’t implemented adequate security. Vick argues that taking over the NPM account of a popular project to conduct a software supply chain attack continues to be too easy. Part of the problem is that JavaScript developers often use packages that implement simple functions that are either already built into the language, like forEach, or ought to be crafted manually to avoid yet another dependency, like left-pad (now built-in as padStart). These trivial packages get incorporated into other packages, which may in turn become dependencies in different packages


#54tsg7q

(#ijjwp4a) @ullarah@txt.quisquiliae.com I asked GPT-3 to summarize and categorize the Email for you, here’s what it said:

Categorize this text:

This text is an email from a hacker who has gained access to the recipient’s devices and has been monitoring their internet activity. The hacker threatens to release embarrassing videos of the recipient if they do not pay a ransom of $1590 within 48 hours.


#mn7exna

(#4pieqwq) @slashdot@feeds.twtxt.net I asked the Open AI’s GPT-3 to summarize the Slashdot article here and this is what it came up with:

The Open Source Security Foundation (OpenSSF) and Linux Foundation are asking for $150 million in funding over two years to fix ten major open-source security problems. The government will not be paying the freight for these changes. Amazon, Ericsson, Google, Intel, Microsoft, and VMWare have

Hmmm 🤔


#dcgcptq

(#nhsmfgq) @prologic@twtxt.net That’s covered in the fine print. You could route it through a remote server, but even if you don’t you still get the other benefits like no AMP links and DDG-style !bangs.

- No tracking/linking of your personal IP address***

***If deployed to a remote server, or configured to send requests through a VPN, Tor, proxy, etc.


#hbi464a